Feeds

Greenland's super-melty summer

Ice is sooo last season

Top 5 reasons to deploy VMware with Tegile

The higher peaks of the Greenland icesheet spent longer melting this summer than any summer since 1988, according to a NASA funded study. The research revealed that enough snow melted in Greenland this year to cover the surface of the USA more than two times over*.

Image of the so-called 2007 Greenland melting anomaly. Credit: NASA

Image of the so-called 2007 Greenland melting anomaly.

Credit: NASA

This so-called melting anomaly is calculated using microwave data from the Special Sensor Microwave Imaging radiometer. It refers to the difference between the number of melting days occuring in 2007 and the average number of melting days during the period 1988 to 2006.

Oddly, the increased melting was predominantly concentrated in higher altitude regions.

"When snow melts at those high altitudes and then refreezes, it can absorb up to four times more energy than fresh, unthawed snow," said Marco Tedesco, a research scientists at the Joint Centre for Earth Systems Technology.

"This can affect Earth's energy budget by changing how much radiation from the sun is absorbed by the Earth versus that reflected back into the atmosphere. Refrozen snow can also alter the snow density, thickness and snow-water content."

Tedesco said the results came as something of a surprise, and demonstrated just how complex the environmental systems of our planet are.

Overall, the time spent melting in Greenland this year was up 30 per cent on the average for the last two decades. This isn't a record peak, but could be indicative of a trend towards longer periods of melting in the region.

Tedesco noted: "Aside from contributing to direct sea level rise, melting especially along the coast can speed up glaciers since the meltwater acts like a lubricant between the frozen surface and the bedrock deep below. The faster glaciers flow, the more water enters the ocean and potentially impacts sea level rise." ®

Click here for a larger version of the picture, with appropriate scale.

*What this is in sheepsecs/multiples of Wales is left as an exercise for the reader.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Renewable energy 'simply WON'T WORK': Top Google engineers
Windmills, solar, tidal - all a 'false hope', say Stanford PhDs
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
NASA launches new climate model at SC14
75 days of supercomputing later ...
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Simon's says quantum computing will work
Boffins blast algorithm with half a dozen qubits
LIFE, JIM? Comet probot lander found 'ORGANICS' on far-off iceball
That's it for God, then – if Comet 67P has got complex molecules
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.